Qantas tech exec shifts to Jetstar

 

Jayne Hrdlicka takes lead at low-cost subsidiary.

Qantas has unveiled a major restructure that will see its group executive of strategy and information technology take the top job at low-cost carrier Jetstar.

The Qantas group today separated its domestic and international operations into two businesses, each with "its own CEO and its own operational and commercial functions" (pdf).

Qantas group executive of strategy and information technology, Jayne Hrdlicka, will take up Jetstar Group chief Bruce Buchanan's role over the next six months as part of the restructure.

"Jayne Hrdlicka has been vital to the development of the [Qantas] Group's strategy and will have an important job managing the Jetstar business across multiple markets following a successful expansion under Bruce Buchanan," Qantas CEO Alan Joyce said.

The airline does not plan to reinstate a head of strategy and technology. Rather, it has brought the function under the remit of chief financial officer Gareth Evans.

The move from technology division to Jetstar leadership is not unprecedented.

Jetstar's Australia and New Zealand CEO David Hall was formerly responsible for the Qantas Group's technology platform and service delivery.

Qantas still has chief information officer Paul Jones and an IT leadership team that leads a technology division numbering some 170 personnel.

iTnews is seeking further information on the changed IT organisational structure.

Copyright © iTnews.com.au . All rights reserved.


Qantas tech exec shifts to Jetstar
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 422

Vote